Netsec – Telegram
Netsec
7.39K subscribers
22.4K links
This channel posts the feed from r/netsec.
For any suggestions dm @streaak
Donate to keep the bot running https://www.paypal.me/akhilgv
Download Telegram
Hacking Wordpress Site Using WPScan
https://ift.tt/2s0ansG

Submitted May 23, 2018 at 08:15PM by vortex1000
via reddit https://ift.tt/2x2NbPq
Hack A Wordpress Site Using WPScan
https://ift.tt/2s0ansG

Submitted May 23, 2018 at 08:04PM by vortex1000
via reddit https://ift.tt/2KPU60l
PCI MFA For IBM iSeries
Hello all am new too Reddit so please bear with me for formatting. Currently MFA is required for Access to admin side of our AS/400 per PCI requirements. We have tried HIP profiles on Palo Alto to try to regulate what computers can access the admin side of the AS/400 and then putting MFA at the login of those computers. This does not work as it blocks our normal users from using the green screen. We want to avoid having normal users MFA as we have a small team and the administration of putting MFA on every computer in the company is not plausible. Are any of you out there currently dealing with this same issue? Have you implemented something? Looking for all suggestions and ideas

Submitted May 23, 2018 at 07:47PM by xbsktball10x
via reddit https://ift.tt/2s0aq7Q
New VPNFilter malware targets at least 500K networking devices worldwide
https://ift.tt/2scqK4H

Submitted May 23, 2018 at 08:32PM by trackdrew
via reddit https://ift.tt/2IFAhwb
Zerodrop: Stealth URL toolkit optimized for bypassing censorship filters and dropping malware
https://ift.tt/2IGPyIN

Submitted May 23, 2018 at 10:01PM by Sephr
via reddit https://ift.tt/2s1oiyw
Aaron Toponce : Do Not Use sha256crypt / sha512crypt
https://ift.tt/2scyAv9

Submitted May 23, 2018 at 10:54PM by soullessredhead
via reddit https://ift.tt/2x5ckZw
Can an unattended laptop be bugged without symptoms? Micro-sized exploits?
I have a very shady roommate in my household...she openly talks about cheating others and words it in ways as though it is legitimate.Is it possible for her to bug my laptop in a way where I would never know and that antivirus wouldn't detect it? I mean I visually look at the outside of my computer for obvious *visible* hardware exploits and don't see any, but are nano or micro sized bugs possible?She knows I own digital assets. And I haven't logged in to anything for 3 months now in fear she might have done something to my computer. I wouldn't put it past her to hire a hacker. Shes very sophisticated.I should probably just get a new computer and guard it but would still appreciate input on the matter

Submitted May 23, 2018 at 10:57PM by canyonnight832
via reddit https://ift.tt/2x9CryI
Can a USB DVD reader/writer get infected once connected to a computer that had many malwares before ? Thanks !
I am reposting this because I did an error in the topic

Submitted May 24, 2018 at 01:39AM by aymanbt
via reddit https://ift.tt/2LpiuXJ
Exclusive: FBI Seizes Control of Russian Botnet
No text found

Submitted May 24, 2018 at 05:59AM by foucaultyou
via reddit https://ift.tt/2x4nr57
Ransomeware
After building computers for over 10 years, and seeing a huge number of fraud, and identity theft, and recent events that are not related to this subreddit it got me thinking and me asking questions about both Cyber Security, and Physical security of many "Facility" in America which contain a lot of personal information.Anyways about the Computer Security, I am rather concerned because many "Hospital" and "Doctors Offices" even "Police Departments" have been hit with Ransomware attacks, but my question is how secure are their networks really.Most Facility I have been in only have a few security guards, and all use (Dell Computers) which often have (USB Ports) on them, often they use "Intranet" for their secure network, and run at 5.0 GHZ, while letting everyone else use free public WI-FI, the concern I have is the physical access to these systems is easy enough for anyone to slip a (USB Computer), or Flash Drive into any of these computer systems because unused ports are not powered down, often no one is watching either.. So in theory how easy is it for a facility no names given to have "Ransomware" installed on their system by someone plugging in a USB Drive.. Or having private information of many stolen by someone who uses I think its called a USB Computer with malicious code.Often these computers are basic dell's without any type of real "Anti Virus" or security software installed or properly configured. Another true fact is I have seen at least (3 Routers) which are owned by different facility using (Default User Passwords) in the past was able to login to the entire network configuration page, although this is public internet and couldn't be used to steal information itself, it got me thinking about what if someone had a mini computer plugged in behind one of these computer systems and connected on the network just sending out information for months which could grant it access to the (Intranet) which is supposed to be the secure network no longer secure.Let alone the emploee who work there and could easily compromise persons information by accident, or on purpose.Am I right about this, or am I just too paranoid?https://www.youtube.com/watch?v=pL9q2lOZ1Fw&t=77s^ Like in this video...This doesn't include when people leave your personal information on a computer and anyone can just go look at it who enters the room next like at a "Dentist" for example, but it makes me feel so unsafe.This also brings up the subject on "RF ID" Cards being used for security on most facility, how many Hospital, even Police departments use these in America, as well as many other places, yet cloning a persons ID Card like shown in this video seems to be a serious secuirty issue, so why not have more secure authentication?

Submitted May 24, 2018 at 11:03AM by LilithDragonFlower
via reddit https://ift.tt/2J8FVpI